[tor-relays] attacks from problematic tor exit relays

Amadeus Ramazotti cryptoquantumhammer at gmail.com
Thu Dec 31 14:43:35 UTC 2020


hey,
there is a decent amount of academic research papers on this very question.

If I remember correctly the tor project homepage does offer some resources.

Some of these papers are quite technical, but even as a non infosec professional I was able to get the basic concept most of the times.


greets

> On 24 Dec 2020, at 11:10 PM, BRBfGWMz <brbfgwmz at concealed.company> wrote:
> 
> I am trying to guess what kind of target attacks are possible through problematic relays.
> 
> Suppose the network relay is controlled by the enemy.
> 
> How do they determine the original IP address of the outbound traffic? Correlation attacks are possible, but they seem very difficult and probably require a lot of resources. Also, changing the route stops this.
> 
> If I assume that they determine what traffic flow is mine, and that I always use the same route, what attacks are possible? Are there any good posts or videos?
> 
> 
> 
> --
> Sent using MsgSafe.io's Free Plan
> Private, encrypted, online communication
> For everyone. www.msgsafe.io
> _______________________________________________
> tor-relays mailing list
> tor-relays at lists.torproject.org
> https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20201231/55c38068/attachment.htm>


More information about the tor-relays mailing list